IT Management  >   Systems Operations  >  

Active Security Solutions

RSS Feed    Add to Google    Add to My Yahoo!
Active Security Solutions White Papers (View All Report Types)
Hearts Continue to Bleed: Heartbleed One Year Later
sponsored by Venafi
WHITE PAPER: This white paper discusses why the Heartbleed vulnerability has taken so long to remediate and why you may still be more vulnerable than you think.
Posted: 14 Sep 2015 | Published: 14 Sep 2015


Transforming the Desktop to Align with Today’s Mobile Reality
sponsored by VMware
WHITE PAPER: This white paper details desktop transformation – aligning desktop computing with today's dominant trend of business mobility. Read on to learn what desktop transformation can enable and discover how organizations have transformed their business by transforming their desktops.
Posted: 14 Sep 2015 | Published: 31 Jul 2015


Case Study: Centralizing Endpoint Management for Peak Performance
sponsored by Earthlink.
WHITE PAPER: This case study tells how a global consulting firm consolidated endpoint security for 85 different offices and achieved one-stop visibility and management for mobile endpoints.
Posted: 18 Sep 2015 | Published: 18 Sep 2015


How Cryptographic Keys Enabled Hackers to Undermine Security
sponsored by Venafi
WHITE PAPER: This infographic breaks down a trust-based attack, showing how hackers compromised vulnerable encryption keys and why security controls didn't stop them.
Posted: 17 Sep 2015 | Published: 17 Sep 2015


Dangers of the Deep, Dark Web
sponsored by IBM
WHITE PAPER: This white paper describes two of the most frequently used Deep Web networks and suggests how you can stay safe from attacks that originate there.
Posted: 11 Sep 2015 | Published: 31 May 2015


Security Insights: Building Secure Social Media Monitoring
sponsored by Unisys
WHITE PAPER: This white paper discusses how you can alleviate customer fears about social media monitoring with better data management and security practices.
Posted: 24 Sep 2015 | Published: 24 Sep 2015


Simplifying Security for Software-Defined Data Centers
sponsored by HyTrust
WHITE PAPER: Save time on compliance and audit reporting and speed time to resolution for trouble shooting with advanced reporting on NSX admin access and changes.
Posted: 07 Oct 2015 | Published: 07 Oct 2015


Encrypted Traffic Management for Dummies
sponsored by Blue Coat Systems
WHITE PAPER: In this e-book, you'll learn everything you need to know about keeping SSL-encrypted traffic both private and secure.
Posted: 11 Sep 2015 | Published: 11 Sep 2015

Blue Coat Systems

Achieving Endpoint Protection with SANS Critical Security Controls
sponsored by Dell, Inc.
WHITE PAPER: This white paper presents twenty security controls suggested by the SANS Institute that will help you maintain endpoint security in today's complex IT environment.
Posted: 01 Oct 2015 | Published: 01 Oct 2015

Dell, Inc.

Ransomware: How cyber criminals hold your data hostage
sponsored by IBM
WHITE PAPER: This white paper explores the growing ransomware threat and how you can defend against it.
Posted: 09 Sep 2015 | Published: 30 Jun 2015

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement